General
-
Target
1626736346daf454425b345a579104ef4d2b4d66c496dea49a2c35fbbf1b8f39
-
Size
2.8MB
-
Sample
240527-xwsebafg87
-
MD5
a1f8a1a2651e2530e1c43bca867a0cd7
-
SHA1
51607b5f21e166b171560d69819a32a07613d7ca
-
SHA256
1626736346daf454425b345a579104ef4d2b4d66c496dea49a2c35fbbf1b8f39
-
SHA512
38180fb5a81af1a16c0cf92a0dd0d8721dd755bd1e420d56959f683e2b6d5110e03bb780bf494211d07dbc1bddad67bc4b336c1dcb4442ff1e4147786ac209b8
-
SSDEEP
49152:S1G1NtyBwTI3ySZbrkXV1etEKLlWUTOfeiRA2R76zHrWax9hMki8Cnki2WGcR:S1ONtyBeSFkXV1etEKLlWUTOfeiRA2RT
Behavioral task
behavioral1
Sample
1626736346daf454425b345a579104ef4d2b4d66c496dea49a2c35fbbf1b8f39.exe
Resource
win7-20240215-en
Malware Config
Targets
-
-
Target
1626736346daf454425b345a579104ef4d2b4d66c496dea49a2c35fbbf1b8f39
-
Size
2.8MB
-
MD5
a1f8a1a2651e2530e1c43bca867a0cd7
-
SHA1
51607b5f21e166b171560d69819a32a07613d7ca
-
SHA256
1626736346daf454425b345a579104ef4d2b4d66c496dea49a2c35fbbf1b8f39
-
SHA512
38180fb5a81af1a16c0cf92a0dd0d8721dd755bd1e420d56959f683e2b6d5110e03bb780bf494211d07dbc1bddad67bc4b336c1dcb4442ff1e4147786ac209b8
-
SSDEEP
49152:S1G1NtyBwTI3ySZbrkXV1etEKLlWUTOfeiRA2R76zHrWax9hMki8Cnki2WGcR:S1ONtyBeSFkXV1etEKLlWUTOfeiRA2RT
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Detects executables containing URLs to raw contents of a Github gist
-
UPX dump on OEP (original entry point)
-
XMRig Miner payload
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-